A security access control method for USB storage device based on thin virtual machine monitor
A virtual machine monitor and security access control technology, applied in computer security devices, program control design, program control devices, etc., can solve problems such as low security and lack of comprehensive decision-making ability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] The present invention will be described in further detail below through specific embodiments and accompanying drawings.
[0030] figure 1 It is a system architecture diagram of the present invention. The present invention intercepts the identification operation, read operation, and write operation of a specific USB storage device according to the access rights that the USB storage device has by analyzing the realization principle of the USB host controller in BitVisor (i.e. figure 1 The function shown in the "intercept module" in the above), to achieve the purpose of device security access control. That is, the present invention adds a USB identification module, a read-only control module and a write-only control module on the basis of the USB host controller in the BitVisor.
[0031] 1. Implementation method of equipment identification control
[0032] Register a HOOK function (hook function) for the prohibited USB storage device in Bitvisor, such as figure 1 As sh...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


